Alert button
Picture for Shouling Ji

Shouling Ji

Alert button

Edge Deep Learning Model Protection via Neuron Authorization

Add code
Bookmark button
Alert button
Mar 23, 2023
Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang, Shouling Ji

Figure 1 for Edge Deep Learning Model Protection via Neuron Authorization
Figure 2 for Edge Deep Learning Model Protection via Neuron Authorization
Figure 3 for Edge Deep Learning Model Protection via Neuron Authorization
Figure 4 for Edge Deep Learning Model Protection via Neuron Authorization
Viaarxiv icon

Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models

Add code
Bookmark button
Alert button
Mar 23, 2023
Yuxuan Duan, Xuhong Zhang, Chuer Yu, Zonghui Wang, Shouling Ji, Wenzhi Chen

Figure 1 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Figure 2 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Figure 3 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Figure 4 for Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models
Viaarxiv icon

FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases

Add code
Bookmark button
Alert button
Feb 28, 2023
Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin

Figure 1 for FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases
Figure 2 for FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases
Figure 3 for FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases
Figure 4 for FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases
Viaarxiv icon

TextDefense: Adversarial Text Detection based on Word Importance Entropy

Add code
Bookmark button
Alert button
Feb 12, 2023
Lujia Shen, Xuhong Zhang, Shouling Ji, Yuwen Pu, Chunpeng Ge, Xing Yang, Yanghe Feng

Figure 1 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 2 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 3 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 4 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Viaarxiv icon

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning

Add code
Bookmark button
Alert button
Dec 01, 2022
Pengyu Qiu, Xuhong Zhang, Shouling Ji, Yuwen Pu, Ting Wang

Figure 1 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Figure 2 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Figure 3 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Figure 4 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Viaarxiv icon

Hijack Vertical Federated Learning Models with Adversarial Embedding

Add code
Bookmark button
Alert button
Dec 01, 2022
Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang

Figure 1 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 2 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 3 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 4 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Viaarxiv icon

Demystifying Self-supervised Trojan Attacks

Add code
Bookmark button
Alert button
Oct 13, 2022
Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang

Figure 1 for Demystifying Self-supervised Trojan Attacks
Figure 2 for Demystifying Self-supervised Trojan Attacks
Figure 3 for Demystifying Self-supervised Trojan Attacks
Figure 4 for Demystifying Self-supervised Trojan Attacks
Viaarxiv icon

Reasoning over Multi-view Knowledge Graphs

Add code
Bookmark button
Alert button
Sep 27, 2022
Zhaohan Xi, Ren Pang, Changjiang Li, Tianyu Du, Shouling Ji, Fenglong Ma, Ting Wang

Figure 1 for Reasoning over Multi-view Knowledge Graphs
Figure 2 for Reasoning over Multi-view Knowledge Graphs
Figure 3 for Reasoning over Multi-view Knowledge Graphs
Figure 4 for Reasoning over Multi-view Knowledge Graphs
Viaarxiv icon

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution

Add code
Bookmark button
Alert button
Sep 05, 2022
Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang

Figure 1 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 2 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 3 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 4 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Viaarxiv icon

VeriFi: Towards Verifiable Federated Unlearning

Add code
Bookmark button
Alert button
May 25, 2022
Xiangshan Gao, Xingjun Ma, Jingyi Wang, Youcheng Sun, Bo Li, Shouling Ji, Peng Cheng, Jiming Chen

Figure 1 for VeriFi: Towards Verifiable Federated Unlearning
Figure 2 for VeriFi: Towards Verifiable Federated Unlearning
Figure 3 for VeriFi: Towards Verifiable Federated Unlearning
Figure 4 for VeriFi: Towards Verifiable Federated Unlearning
Viaarxiv icon